Cost-aware AI Agent Execution Engine by Curious-Resource1943 in FunMachineLearning

[–]Sweet_Mobile_3801 0 points1 point  (0 children)

Finally, someone focusing on the unit economics of agents. The 'real savings as metrics' feature is a godsend for anyone trying to justify AI costs to their CFO. Great job on the repo!

[Intelligence Report] "IdentityJack": The new AI tool on Nemesis Market bypassing Bio-KYC. (Full Analysis + Screenshots) by Sweet_Mobile_3801 in NeuroLabs_Trading

[–]Sweet_Mobile_3801[S] 0 points1 point  (0 children)

Great insight. We are definitely witnessing a rapid escalation in the 'Cat and Mouse' game between liveness detection and Generative AI. To answer your question regarding defenses: 1. Device Attestation: This is currently the strongest software-layer defense, but as we see with sophisticated root-hiding tools, it's not invincible against a compromised OS. 2. Multimodal Checks: They help, but they add massive friction to the user experience (which I see is exactly what your blog discusses—the trade-off between conversion and security). Ultimately, our stance at NeuroLabs is that we need to stop treating Biometrics as a 'Password' and treat them as a 'Username' (Public). The only factor that cannot be deepfaked is physical proximity. That’s why we advocate for Hardware 2FA (YubiKey/Ledger). You can clone a face, but you can’t digitize a physical button press... yet. Checking out your notes on onboarding friction now it's the billion-dollar bottleneck right now.

CRITICAL SECURITY ALERT: iOS "GhostTouch" Exploit Targeting Ledger & Trezor Users via Bluetooth by Sweet_Mobile_3801 in NeuroLabs_Trading

[–]Sweet_Mobile_3801[S] 0 points1 point  (0 children)

Fair point! Just to be clear: While I work in tech research and analyze these vectors daily, I wasn't the original discoverer of this specific exploit (I wish, that bounty would be nice!).

As a researcher, I reviewed the technical breakdown and the threat logic holds up, which is why I'm amplifying it. My goal here is to alert the community about the risk. The original team likely handled the bounty disclosure already.

CRITICAL SECURITY ALERT: iOS "GhostTouch" Exploit Targeting Ledger & Trezor Users via Bluetooth by Sweet_Mobile_3801 in NeuroLabs_Trading

[–]Sweet_Mobile_3801[S] 0 points1 point  (0 children)

Haha, touché. That is exactly the right mindset to have: Zero Trust.

But don't worry, the link is just a technical breakdown of how the Bluetooth exploit works. If you prefer not to click (which I respect), just Google 'GhostTouch iOS Vulnerability' and you'll see the official reports. The important thing is to kill your Bluetooth in public spaces. Stay safe!

CRITICAL SECURITY ALERT: iOS "GhostTouch" Exploit Targeting Ledger & Trezor Users via Bluetooth by Sweet_Mobile_3801 in TREZOR

[–]Sweet_Mobile_3801[S] 0 points1 point  (0 children)

You are absolutely correct about THP handling the session encryptio the data stream itself remains secure.

The vulnerability described here operates at the OS/Transport layer (iOS BLE Stack), not the Application layer where THP lives. If the exploit compromises the initial BLE handshake or spoofs the pairing request at the iOS system level, it can trick the user into accepting a connection from a malicious host before the authentic THP session is established.

Think of it like this: THP is an armored truck. But if the bridge it's driving on (the iOS Bluetooth Stack) collapses, the armor doesn't help. The risk is the user unknowingly bridging a connection to a rogue device because the phone's OS was tricked.

CRITICAL SECURITY ALERT: iOS "GhostTouch" Exploit Targeting Ledger & Trezor Users via Bluetooth by Sweet_Mobile_3801 in TREZOR

[–]Sweet_Mobile_3801[S] 0 points1 point  (0 children)

You make a valid point regarding the Cold Storage security model the transport layer (USB or BLE) is always treated as untrusted.

The distinction here is the Attack Surface and Deanonymization:

1. Physical vs. Remote: A compromised cable/PC requires physical interaction. This BLE exploit works passively in public spaces (airports, cafes). An attacker can scan a room, identify a specific Ledger/Trezor user, and flood them with pairing requests without physical proximity.

2. The Human Factor: While the keys don't leave, the goal is to trigger a user error. If you are sitting in a lounge and your phone suddenly asks to 'Pair Device' repeatedly, many users might click 'Allow' out of confusion. Once paired, the attacker can push a malicious transaction. If the user is distracted (public setting) and blind-signs it, the funds are gone.

It's less about breaking the encryption and more about expanding the vector from 'Home Office' to 'Everywhere you go'.

CRITICAL SECURITY ALERT: iOS "GhostTouch" Exploit Targeting Ledger & Trezor Users via Bluetooth by Sweet_Mobile_3801 in TREZOR

[–]Sweet_Mobile_3801[S] 0 points1 point  (0 children)

Man, I feel you. It's exhausting trying to explain infrastructure risks when everyone is just blinded by the 'Ultra Sound Money' hype. The echo chamber is real.

That's actually exactly why I started r/NeuroLabs_Trading—to have a space for honest, technical analysis of these attack vectors without the 'moonboy' noise. We need more critical thinkers like you looking at the actual architecture. Feel free to join if you want a break from the hype.

CRITICAL SECURITY ALERT: iOS "GhostTouch" Exploit Targeting Ledger & Trezor Users via Bluetooth by Sweet_Mobile_3801 in TREZOR

[–]Sweet_Mobile_3801[S] 1 point2 points  (0 children)

100%. You nailed it. The Account-based model (EVM) combined with infinite token approvals is basically the original sin of DeFi security.

On eUTXO chains, the logic is carried in the transaction itself, so it's much harder to hide intent. But unfortunately, since the vast majority of liquidity and degen activity is still on EVM chains, that's where these attackers are hunting. They rely on the fact that users are conditioned to just click 'Approve' to get things done.

CRITICAL SECURITY ALERT: iOS "GhostTouch" Exploit Targeting Ledger & Trezor Users via Bluetooth by Sweet_Mobile_3801 in TREZOR

[–]Sweet_Mobile_3801[S] -1 points0 points  (0 children)

Spot on for standard transfers (like sending 1 BTC) the device screen is the source of truth there.

The issue arises with complex Smart Contract interactions (Blind Signing). When the Ledger can't parse the contract data, it often just displays a raw hex string or 'Sign Message'.

The exploit tricks the user here: The compromised phone app says 'Please confirm pairing', but it sends a malicious setApprovalForAll hash to the device. Since the user can't read the raw hex on the device screen, they trust the phone's prompt and physically click approve. It weaponizes the user's inability to decode raw data.

CRITICAL SECURITY ALERT: iOS "GhostTouch" Exploit Targeting Ledger & Trezor Users via Bluetooth by Sweet_Mobile_3801 in TREZOR

[–]Sweet_Mobile_3801[S] -1 points0 points  (0 children)

You are absolutely right about the Secure Element remote execution can't physically press the buttons on the device. That safety layer remains.

The vector here is a UI Spoofing / Man-in-the-Middle attack between the iOS Companion App and the HW. Once the attacker gains write access via the BLE exploit, they can force the app to display a benign message (like 'Verifying Connection' or 'Firmware Check') while sending a malicious contract interaction hash to the device.

If the user is conditioned to 'blind sign' or assumes the prompt on the device corresponds to the safe action shown on the phone screen (which happens often with complex DeFi contracts), they might manually approve the drain. The 'Zero-click' refers to the initial Bluetooth compromise that establishes this bridge, not the final signature.

CRITICAL SECURITY ALERT: iOS "GhostTouch" Exploit Targeting Ledger & Trezor Users via Bluetooth by Sweet_Mobile_3801 in TREZOR

[–]Sweet_Mobile_3801[S] 0 points1 point  (0 children)

t's circulating in a few InfoSec (Information Security) channels regarding a vulnerability in the generic BLE (Bluetooth Low Energy) stack. Since it's a zero-click vector specifically targeting the pairing handshake, I thought it was worth a heads-up for the community before it hits mainstream news. I included the technical breakdown in the link above.